/system/security/softkeymaster/include/keymaster/ |
H A D | softkeymaster.h | 33 const size_t keyBlobLength, const uint8_t* data, const size_t dataLength,
|
/system/security/softkeymaster/ |
H A D | keymaster_openssl.cpp | 475 const size_t dataLength, uint8_t** signedData, size_t* signedDataLength) { 495 if (DSA_sign(0, data, dataLength, tmp, &dsaSize, dsa.get()) <= 0) { 507 const size_t dataLength, uint8_t** signedData, size_t* signedDataLength) { 527 if (ECDSA_sign(0, data, dataLength, tmp, &ecdsaSize, eckey.get()) <= 0) { 539 const size_t dataLength, uint8_t** signedData, size_t* signedDataLength) { 554 UniquePtr<uint8_t, Malloc_Free> signedDataPtr(reinterpret_cast<uint8_t*>(malloc(dataLength))); 561 if (RSA_private_encrypt(dataLength, data, tmp, rsa.get(), RSA_NO_PADDING) <= 0) { 566 *signedDataLength = dataLength; 574 const size_t keyBlobLength, const uint8_t* data, const size_t dataLength, uint8_t** signedData, 594 dataLength, signedDat 474 sign_dsa(EVP_PKEY* pkey, keymaster_dsa_sign_params_t* sign_params, const uint8_t* data, const size_t dataLength, uint8_t** signedData, size_t* signedDataLength) argument 506 sign_ec(EVP_PKEY* pkey, keymaster_ec_sign_params_t* sign_params, const uint8_t* data, const size_t dataLength, uint8_t** signedData, size_t* signedDataLength) argument 538 sign_rsa(EVP_PKEY* pkey, keymaster_rsa_sign_params_t* sign_params, const uint8_t* data, const size_t dataLength, uint8_t** signedData, size_t* signedDataLength) argument 572 openssl_sign_data( const keymaster0_device_t*, const void* params, const uint8_t* keyBlob, const size_t keyBlobLength, const uint8_t* data, const size_t dataLength, uint8_t** signedData, size_t* signedDataLength) argument [all...] |
/system/security/keystore/include/keystore/ |
H A D | IKeystoreService.h | 67 size_t dataLength; member in struct:android::OperationResult 80 size_t dataLength; member in struct:android::ExportResult 173 virtual int32_t verify(const String16& name, const uint8_t* data, size_t dataLength, 191 virtual int32_t addRngEntropy(const uint8_t* data, size_t dataLength) = 0; 217 const uint8_t* data, size_t dataLength, OperationResult* result) = 0;
|
/system/security/keystore/ |
H A D | IKeystoreService.cpp | 52 data(NULL), dataLength(0) { 64 dataLength = 0; 71 dataLength = (size_t) length; 87 out->writeInt32(dataLength); 88 if (dataLength && data) { 89 void* buf = out->writeInplace(dataLength); 91 memcpy(buf, data.get(), dataLength); 99 ExportResult::ExportResult() : resultCode(0), exportData(NULL), dataLength(0) { 108 dataLength = 0; 115 dataLength 1102 update(const sp<IBinder>& token, const KeymasterArguments& params, const uint8_t* opData, size_t dataLength, OperationResult* result) argument [all...] |
H A D | keystore.cpp | 618 size_t dataLength = mBlob.length + sizeof(mBlob.length); local 620 size_t digestedLength = ((dataLength + AES_BLOCK_SIZE - 1) 627 memset(mBlob.value + mBlob.length, 0, digestedLength - dataLength); 1328 size_t dataLength; local 1337 rc = mDevice->import_keypair(mDevice, key, keyLen, &data, &dataLength); 1345 rc = mFallbackDevice->import_keypair(mFallbackDevice, key, keyLen, &data, &dataLength); 1354 Blob keyBlob(data, dataLength, NULL, 0, TYPE_KEY_PAIR); 2031 int32_t verify(const String16& name, const uint8_t* data, size_t dataLength, argument 2036 return doLegacySignVerify(name, data, dataLength, NULL, NULL, signature, signatureLength, 2060 *pubkeyLength = result.dataLength; 2215 addRngEntropy(const uint8_t* data, size_t dataLength) argument 2564 update(const sp<IBinder>& token, const KeymasterArguments& params, const uint8_t* data, size_t dataLength, OperationResult* result) argument [all...] |
/system/netd/server/ |
H A D | MDnsSdListener.cpp | 434 int dataLength = strlen(argv[i]); local 435 if (dataLength < 1) { 438 if (dataLength > 255) { 443 if (ptr + dataLength + 1 > txtRecord + sizeof(txtRecord)) { 448 *ptr++ = dataLength; 450 ptr += dataLength;
|